ARTICLES

Can Hackers Hack Nuclear Missiles

In the history of cyberwarfare, missiles armed with nuclear weapons have not been hacked. But does this imply that it's impossible to hack nuclear...

Why Security is Crucial for Home Automation

Nowadays, when the cost of smart homes is rapidly decreasing, security is often overlooked or not implemented due to the cost factor. Read to...

All About Recent EPF Portal Hacking

After the recent hacking incident of one of the Aadhaar-seeding portals of the EPFO, there seems to be some confusions on data theft of...

Understanding GDPR & its Implications

With the reverse countdown for the enforcement of General Data Protection Regulation, it is time to review the GDPR assess its implications for organizations....

NEWS

Fortinet Threat Landscape Report Reveals an Evolution of Malware to Exploit...

Fortinet announced the findings of its latest Global Threat Landscape Report. The research reveals cybercriminals are evolving their attack methods to increase their success...

SPYRUS Windows To Go Trial Pack replaces devices that don’t...

SPYRUS Windows To Go Device Trial Pack with SEMSaaS Device Management to Replace Competitive Devices that Do Not Support Recent Windows 10 Updates Microsoft Certified...

Supply chain the new weak link in business security

Supply chain the new weak link in business security as ransomware attacks increase according to Dimension Data 2017 saw a worrying increase in ransomware and...

Kingston Encrypted USB Drives are Key Component of Impending GDPR Compliance

Kingston Digital, Inc., the Flash memory affiliate of Kingston Technology Company, Inc., has been at the forefront of how the new General Data Protection...

INTERVIEWS

Interview with Alisdair Faulkner, Chief Products Officer, ThreatMetrix, U.S

Alisdair Faulkner, Chief Products Officer, ThreatMetrix, explains how his organisation secures the digital identity of business and government enterprises through digital identity intelligence and...

Interview of Thiagarajan, Director – IT, India & Asia, IMI Critical...

With the growing threat landscape in cyber space, how matured the critical industry sector is in India to protect their business sensitive data? The critical...

Interview with Sharad Sadadekar, CISO, HDFC Life Insurance

With the growing threat landscape in cyber space, how HDFC Life Insurance has been managing to protect their business sensitive data? Financial organisations are entrusted...

Keyur Desai, CIO – ESSAR Ports & Shipping, says that user...

With the growing threat landscape in cyber space, how Essar has been managing to protect their business sensitive data? While the threat landscape has been...

INDUSTRY INPUTS

Significance of Trust in Information Technology

In this brief article, Ticky Thakkar explains the significance of trust in various technologies with respect to security. Trust is defined as “a firm belief...

OPINION Patches, Data and Patient Security

Security and medicine are increasingly intertwined, especially in today's highly regulated world where more people care for privacy and data protection. However, with companies...

Confronting The Automotive Cyber Threat

The first 10 weeks of 2018 have already produced a wide and sophisticated range of automotive hacks for some of the world’s leading brands. As...